Automatic data encryption and access control based on bluetooth device proximity
A method, apparatus, and system for using Bluetooth devices to secure sensitive data on other Bluetooth devices is described. A Bluetooth device is paired with a “trusted” Bluetooth device. When contact with the trusted device is lost, designated sensitive data on the secured Bluetooth device is automatically encrypted. When contact is restored, the data is automatically decrypted. In an alternate embodiment, a secured device can be associated with multiple trusted devices, and the secured device designate different sensitive data for each trusted device. In this way, multiple users can share a common, “public” Bluetooth device without concern that the other users will access their sensitive data on the device when the device is not being used by that user.
Latest Broadcom Corporation Patents:
The present application is a CONTINUATION of U.S. application Ser. No. 12/835,529, filed Jul. 13, 2010, which is a CONTINUATION of U.S. application Ser. No. 12/330,998, filed Dec. 9, 2008, now issued U.S. Pat. No. 7,756,478, which is a CONTINUATION of U.S. application Ser. No. 11/074,271, filed Mar. 7, 2005, now issued U.S. Pat. No. 7,463,861. The above-identified applications are hereby incorporated by reference in their entirety.
The present application is related to U.S. application Ser. No. 11/073,801, filed Mar. 7, 2005, now issued U.S. Pat. No. 7,424,267; U.S. application Ser. No. 12/207,071, filed Sep. 9, 2008, now issued U.S. Pat. No. 7,796,946; U.S. application Ser. No. 12/881,368, filed Sep. 14, 2010; U.S. application Ser. No. 11/073,647, filed Mar. 7, 2005, now issued U.S. Pat. No. 7,925,212; and U.S. Application No. 13/084,910, filed Apr. 12, 2011.
FIELD OF THE INVENTIONCertain embodiments of the invention relate to wireless security. Certain embodiments of the invention relate to a method and system for securing Bluetooth® devices. Aspects of the invention are especially adapted for use in a system that encrypts sensitive data on a Bluetooth device when a device is no longer in the proximity of another “trusted” Bluetooth device.
BACKGROUND OF THE INVENTIONMore and more personal data is being stored on ever smaller and more mobile devices. The risk that sensitive data regarding identity, access codes, or business information could be compromised if one of these devices is mislaid increases with the amount of information that can be stored on them and their increasingly pervasive use. Requiring the entry of security codes or keys is a partial solution, but the efficacy of this solution decreases to the extent that the device is left “unlocked” or the security feature to utilize the feature is disabled because it is inconvenient.
Further limitations and disadvantages of conventional and traditional approaches to securing personal computing devices will become apparent to one of skill in the art, through comparison of such systems with some aspects of the present invention as set forth in the remainder of the present application with reference to the drawings.
BRIEF SUMMARY OF THE INVENTIONAspects of the invention may be found in a method and system for securing data stored on a Bluetooth® device, for example, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
These and other advantages, aspects and novel features of the present invention, as well as details of an illustrated embodiment thereof, will be more fully understood from the following description and drawings.
Certain embodiments of the invention may be found in a method and system for detecting the proximity of Bluetooth devices. Certain embodiments of the invention may be found in a method and system for locating proximate Bluetooth® devices and exchanging encryption keys. Additional embodiments encrypt data when a trusted device is no longer present, or lock the device.
Bluetooth wireless technology is set to revolutionize personal connectivity by providing freedom from wired connections. Bluetooth is a specification for a small form-factor, low-cost radio solution providing links between mobile computers, mobile phones and other portable and handheld devices. Of particular interest is Bluetooth's low power consumption and short range, coupled with the ability of Bluetooth devices to automatically detect and attach to other Bluetooth devices that are close by, typically within 10 meters or less.
About Bluetooth
Bluetooth wireless technology is an international, open standard for allowing intelligent devices to communicate with each other through wireless, short-range communications. This technology allows any sort of electronic equipment—from computers and cell phones to keyboards and headphones—to make its own connections, without wires, cables or any direct action from a user. Bluetooth is currently incorporated into numerous commercial products including laptops, PDAs, cell phones, and printers, with more products coming out every day.
How Bluetooth Works
Bluetooth is a frequency hopping spread spectrum (FHSS) radio system operating in the 2.4 GHz unlicensed band. Its low power transmissions allow a typical range of about 10 meters. Devices connect to each other to form a network known as a piconet, with up to seven active devices in the piconet.
Bluetooth has a protocol stack to transfer data and implement the advanced features required by applications. The protocol stack consists of several different protocols designed for different purposes. The profiles, or applications, reside above the protocol stack. Bluetooth also has a lower protocol stack for link management and baseband control.
Bluetooth hardware implementations are typically highly integrated systems consisting of one or two chips.
The Bluetooth baseband chip consists of a processor core such as an ARM7 with integrated memories 307, Bluetooth baseband 309, and several other peripherals. The radio is implemented in a separate chip 303. The ARM7 processor runs all the required software including a lower stack, an upper stack, and an embedded profile. This type of single CPU implementation allows for a small, low power, low cost solution.
The software “stack” contemplates the insertion of useful applications in the higher layers of the stack. These applications can be designed to take advantage of Bluetooth's lower layers to implement functionality based on Bluetooth radio links.
The short range nature of Bluetooth wireless networking allows it to be used for device proximity detection. Based on the presence or absence of devices, sensitive data on handheld devices or desktop computers can be encrypted on the fly without any user intervention. Sensitive data is encrypted/decrypted based on the proximity or not of “trusted” Bluetooth enabled devices. A trust relationship is established by exchanging Bluetooth link keys using the device pairing procedure and explicitly marking the device as trusted. Once such a relationship is established, sensitive data is automatically encrypted and decrypted based on the availability of trusted devices. Trusted devices could include cellular phones, desktop computers, laptop computers or specialty devices like Bluetooth key-chains. A device performs regular Bluetooth scans to detect trusted devices in the area. If no device is detected, all data in a file area marked as sensitive will be automatically encrypted after a timeout expires. Once a trusted device enters proximity, the data is automatically decrypted and ready to be viewed/edited by the user. Optionally, the device may also be locked for access when no trusted device is found.
A method in accordance with the present invention may be extended to desktop devices that are Bluetooth enabled. Again, certain file areas may be marked as sensitive. The Bluetooth software performs regular scans for trusted personal devices like cellular phones, PDAs or Bluetooth key chains. If no trusted device is found, sensitive data is encrypted on the fly and the screen may optionally be locked for the user. This allows a user to walk away from his desk and have the desktop lock itself automatically until he or she returns.
Aspects of the invention may be substantially integrated onto an integrated circuit or chip, for example a Bluetooth chip. The chip may have machine-readable storage having stored thereon, a computer program having a code section for detecting the presence of other Bluetooth devices. The program may include at least one code section being executable by a machine for causing the machine to perform steps comprising those substantially as shown and described below.
An integrated circuit of the invention may also include an application layer that performs methods in accordance with aspects of the invention. The integrated circuit is desirably connected to a Bluetooth radio. The integrated circuit may also have a unique hardware ID.
Bluetooth standards specify a “pairing” procedure that allows one device to associate itself with another. Pairing is described in detail in the Bluetooth 1.2 core specification, Vol. 3, Section 3.3.
In an exemplary embodiment, the system utilizes at least two devices. Initially, the devices are not “paired.” Once the devices are brought into proximity with each other, the owner can allow them to associate with each other. Once paired, a method in accordance with the invention can be employed to mark the paired device as a trusted device. Each device will then recognize the other device as “trusted.” Once this association is made, software in each device is used to lock the device or encrypt designated files whenever the “trusted” device is detected as not being present. Any Bluetooth device can be both a trusted and/or secured device. For example, cell phone 107 could be the trusted device for secured device laptop 105. Headset 103 could be the trusted device for secured device cell phone 107.
The logical flow of one method of the invention is described in connection with
It should be appreciated that one of the advantages of this or other methods in accordance with the invention is that a secured device need not be totally disabled when the trusted device is absent. Thus, cellphone 107 may still be used without headset 103, however the person to whom cellphone 107 is lent cannot, without the headset, access, for example the personal phone book of the owner of cellphone 107 even though they may borrow the phone to make a call.
The following code illustrates an example of a software program that implements one or more embodiments of the invention in a Bluetooth enabled device. The following code encrypts a sensitive memo based on the proximity or not of a trusted Bluetooth device:
In an alternate embodiment, the Bluetooth enabled device does not implement the encryption algorithm on the sensitive data until the expiration of a timer.
Note that any combination of trusted and secured devices is possible. For example, several user owned devices containing sensitive data can be paired with a single “trusted” device. The trusted device can take the form of a “key fob” or other small personal item dedicated to the function of providing a trusted Bluetooth device for the users entire set of Bluetooth enabled devices. Thus, a single person's sensitive data is proximity keyed to a single device and is not accessible to others. In another variation, it is possible for a single secured device to be paired with multiple “trusted” devices. Because each trusted device can be associated with different sensitive data, this allows multiple users, even strangers, to share a common computer containing data that is sensitive to each of them without concern that the other user will read the private data. This allows, for example, multiple drivers to share a “pooled” vehicle containing integrated phone and GPS services where each driver has private address information stored on the car's computer. It also allows hospitals to encrypt private medical data generally, but allow medical technicians to access the private data when, e.g., the patient is in the same room as the terminal or has provided his or her “key” to the medical staff.
Accordingly, the present invention may be realized in hardware, software, or a combination of hardware and software. The present invention may be realized in a centralized fashion in at least one computer system or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited. A typical combination of hardware and software may be a general-purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
The present invention may also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which when loaded in a computer system is able to carry out these methods. Computer program in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to another language, code or notation; b) reproduction in a different material form.
While the present invention has been described with reference to certain embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the present invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present invention without departing from its scope. Therefore, it is intended that the present invention not be limited to the particular embodiment disclosed, but that the present invention will include all embodiments falling within the scope of the appended claims.
Claims
1. A wireless communications device, comprising:
- a radio circuit that includes a wireless radio; and
- a baseband circuit operatively coupled to the radio circuit, the baseband circuit comprising a baseband processor,
- wherein one or both of the baseband circuit and the radio circuit perform at least the following: pairing the wireless communications device with a second wireless communications device, designating the wireless communications device as a secured device and the second wireless communications device as a trusted device for the secured device, designating at least a portion of a data storage of the secured device as sensitive data, detecting when the trusted device is no longer in proximity with the secured device by using a wireless communications protocol used by the secured device, encrypting the sensitive data if the trusted device is no longer in proximity with the secured device, and decrypting the sensitive data if the trusted device is detected as being in proximity with the secured device.
2. The wireless communications device according to claim 1, wherein the baseband circuit comprises a processor core.
3. A wireless cellular communication device, comprising:
- a radio circuit that includes a wireless radio; and
- a baseband circuit operatively coupled to the radio circuit, the baseband circuit comprising a baseband processor,
- wherein one or both of the baseband circuit and the radio circuit perform at least the following: pairing the wireless cellular communications device with a second wireless communications device, designating the wireless cellular communications device as a secured device and the second wireless cellular communications device as a trusted device for the secured device, designating at least a portion of a data storage of the secured device as sensitive data detecting when the trusted device is no longer detectable by the secured device by using a wireless communications protocol used by the secured device, encrypting the sensitive data if the trusted device is no longer in proximity with the secured device, and decrypting the sensitive data if the trusted device is detected as being in proximity with the secured device.
4. The wireless communications device according to claim 2, wherein the baseband circuit comprises a ROM or a RAM.
5. The wireless communications device according to claim 4, wherein the wireless communications device or the second wireless communications device comprises a cellular device, and wherein the wireless communications device or the second wireless communications device supports spread spectrum communications.
6. The wireless communications device according to claim 1, wherein the wireless communications device or the second wireless communications device comprises a cellular phone.
7. The wireless communications device according to claim 1, wherein the wireless communications device or the second wireless communications device comprises a handheld device, a computer, a laptop computer or a desktop computer.
8. The wireless communications device according to claim 4, wherein the baseband circuit comprises a Bluetooth baseband circuit.
9. The wireless communications device according to claim 1, wherein the wireless communications device or the second wireless communications device supports phone and GPS services.
10. The wireless communications device according to claim 4, wherein the wireless communications device or the second wireless communications device comprises a mobile phone that supports phone and GPS services.
11. The wireless communications device according to claim 1, wherein the baseband circuit comprises a voice codec.
12. The wireless communications device according to claim 1, wherein the trusted device comprises one or more of the following: a handheld device, a cellular phone, a desktop computer, a laptop computer, a PDA, a key fob, a cellular device and a wireless key device.
13. A wireless cellular communication device that supports spread spectrum communications, comprising:
- a radio circuit that includes a wireless radio; and
- a baseband circuit operatively coupled to the radio circuit, the baseband circuit comprising a baseband processor and a voice codec,
- wherein one or both of the baseband circuit and the radio circuit perform at least the following: pairing the wireless cellular communications device with a second wireless communications device, designating the wireless cellular communications device as a secured device and the second wireless cellular communications device as a trusted device for the secured device, designating at least a portion of a data storage of the secured device as sensitive data, detecting when the trusted device is no longer detectable by the secured device by using a wireless communications protocol used by the secured device, encrypting the sensitive data if the trusted device is no longer detectable by the secured device, and decrypting the sensitive data if the trusted device is detected as being in proximity with the secured device.
14. The wireless communications device according to claim 1, wherein the radio circuit and the baseband circuit are part of an integrated circuit chip.
15. The wireless communications device according to claim 1, wherein the secured device is locked if the trusted device is no longer in proximity with the trusted device.
16. The wireless communications device according to claim 1, wherein the secured device is paired with more than one trusted device.
17. The wireless communications device according to claim 1, wherein the secured device is a second trusted device.
18. The wireless communications device according to claim 1, wherein the trusted device is a second secured device.
19. The wireless communications device according to claim 1, wherein the secured device is paired with a plurality of trusted devices, and wherein each trusted device is associated with a respective sensitive data in the data storage of the secured device that is only accessible to the corresponding trusted device when the corresponding trusted device is in proximity of the secured device.
20. The wireless communications device according to claim 1, wherein the secured device and other secured devices are paired with the trusted device.
6088450 | July 11, 2000 | Davis et al. |
6092201 | July 18, 2000 | Turnbull et al. |
6772331 | August 3, 2004 | Hind et al. |
7020456 | March 28, 2006 | Smeets et al. |
7079811 | July 18, 2006 | Lee et al. |
7415242 | August 19, 2008 | Ngan |
7424267 | September 9, 2008 | Eisenbach |
7463861 | December 9, 2008 | Eisenbach |
7756478 | July 13, 2010 | Eisenbach |
7796946 | September 14, 2010 | Eisenbach |
7925212 | April 12, 2011 | Eisenbach |
8019283 | September 13, 2011 | Eisenbach |
20020087632 | July 4, 2002 | Keskar |
20030083047 | May 1, 2003 | Phillips et al. |
20030095521 | May 22, 2003 | Haller et al. |
20030114104 | June 19, 2003 | Want et al. |
20030139180 | July 24, 2003 | McIntosh et al. |
20030199267 | October 23, 2003 | Iwasa et al. |
20040014423 | January 22, 2004 | Croome et al. |
20040029563 | February 12, 2004 | Berg |
20040029619 | February 12, 2004 | Liang et al. |
20040123106 | June 24, 2004 | D'Angelo et al. |
20040125762 | July 1, 2004 | Haller et al. |
20040126038 | July 1, 2004 | Aublant et al. |
20040143750 | July 22, 2004 | Kulack et al. |
20040185857 | September 23, 2004 | Lee et al. |
20040203381 | October 14, 2004 | Cahn et al. |
20040230790 | November 18, 2004 | Zhang et al. |
20040264410 | December 30, 2004 | Sagi et al. |
20050048919 | March 3, 2005 | Jeannerod |
20050105734 | May 19, 2005 | Buer et al. |
20050136834 | June 23, 2005 | Bonta et al. |
20050266826 | December 1, 2005 | Vlad |
20060041760 | February 23, 2006 | Huang |
20060046709 | March 2, 2006 | Krumm et al. |
20060083187 | April 20, 2006 | Dekel |
20060111045 | May 25, 2006 | Orlassino et al. |
20060199536 | September 7, 2006 | Eisenbach |
20060199537 | September 7, 2006 | Eisenbach |
20060199538 | September 7, 2006 | Eisenbach |
20090047903 | February 19, 2009 | Eisenbach |
20090093215 | April 9, 2009 | Eisenbach |
20110003549 | January 6, 2011 | Eisenbach |
20110007900 | January 13, 2011 | Eisenbach |
20110183620 | July 28, 2011 | Eisenbach |
1568579 | January 2005 | CN |
1255383 | November 2002 | EP |
1450273 | August 2004 | EP |
1469659 | October 2004 | EP |
1511235 | March 2005 | EP |
03/017596 | February 2003 | WO |
2004019566 | March 2004 | WO |
2004031488 | April 2004 | WO |
2004112321 | December 2004 | WO |
- Specification of the Bluetooth System, Version 1.2, Nov. 5, 2003, pp. 1-1200.
- Jamaluddin J. et al., Widening Access to Broadband Hotspots Employing Bluetooth, Consumer Electronics, 2004 IEEE International Symposium on Reading, UK, Sep. 1-3, 2004, IEEE, Piscataway, NJ, USA, pp. 224-228, XP010755777, ISBN: 0-7803-8527-6.
- European Search Report for European Application No. EP 05023450.9, May 12, 2006.
- European Search Report for European Application No. EP 05023448.3, May 15, 2006.
- European Search Report for European Application No. EP 05022891.5, Jun. 22, 2006.
Type: Grant
Filed: Aug 23, 2011
Date of Patent: Apr 24, 2012
Patent Publication Number: 20110305340
Assignee: Broadcom Corporation (Irvine, CA)
Inventor: Andre Eisenbach (San Diego, CA)
Primary Examiner: Tuan Pham
Attorney: Thomas, Kayden, Horstemeyer & Risley, LLP
Application Number: 13/215,957
International Classification: H04B 7/00 (20060101);